Impact
The vulnerability is a race condition in the Windows Native WiFi Miniport Driver that permits an unauthorized attacker with access to the same local network to trigger concurrent execution on a shared resource, resulting in arbitrary code execution. This flaw constitutes a remote code execution vulnerability with the potential to compromise confidentiality, integrity and availability of affected systems, and can enable the attacker to gain full control of the host machine.
Affected Systems
Affected systems include Microsoft Windows 10 versions 1607, 1809, 21H2 and 22H2; Microsoft Windows 11 versions 22H3, 23H2, 24H2, 25H2 and 26H1. The flaw also applies to Microsoft Windows Server 2012, 2012 R2, 2016, 2019, 2022, 2025 and the 23H2 Server edition. All of these releases are listed as vulnerable by Microsoft, so any installation of these operating systems remains at risk until the driver is updated.
Risk and Exploitability
The CVSS score of 7.5 indicates high severity. The EPSS score is not available, and the vulnerability is not listed in CISA’s KEV catalog, but the nature of the flaw—a kernel‑mode race condition—suggests that exploitation is possible for an attacker who can deliver crafted Wi‑Fi traffic from a nearby device. Therefore, the likelihood of exploitation is considered significant for environments where the affected driver is in use and wireless clients are not strictly isolated.
OpenCVE Enrichment